tools for preserving your
play

Tools for Preserving Your Personal and Intellectual Privacy Wendy - PowerPoint PPT Presentation

Tools for Preserving Your Personal and Intellectual Privacy Wendy Stephens Jacksonville State University Thursday, July 20, 1:15 2:15pm Eastern A project of the University of Michigan School of Information, U-M Library, and U-M School of


  1. Tools for Preserving Your Personal and Intellectual Privacy Wendy Stephens Jacksonville State University Thursday, July 20, 1:15 – 2:15pm Eastern A project of the University of Michigan School of Information, U-M Library, and U-M School of Education. This project was made possible in part by the Institute of Museum and Library Services RE 00-00-15-0113-15.

  2. Sponsors

  3. Door Prizes

  4. Door Prize: 6 Months of Easel.ly Pro

  5. SCECHs Log in with your full name Attend all of at least 3 live sessions and up to 8 Scan your form and email to contact.data.literacy@umich.edu by Monday, July 24, AND mail it in (mailing is new this year). More information: http://dataliteracy.si.umich.edu/scech

  6. New in 2017! For those needing certificates … Follow SCECH instructions (scan and mail). Plus Go to http://bit.ly/4t-store ◆ Pay $25 there no later than Monday, July 24 ◆

  7. http://dataliteracy.si.umich.edu/conference #4tdl

  8. Join us in the chat! Where are you from?

  9. Tools for Preserving Your Personal and Intellectual Privacy Wendy Stephens Jacksonville State University Thursday, July 20, 1:15 – 2:15pm Eastern A project of the University of Michigan School of Information, U-M Library, and U-M School of Education. This project was made possible in part by the Institute of Museum and Library Services RE 00-00-15-0113-15.

  10. Wendy Stephens, Presenter

  11. Today, we’ll … 1. Talk about privacy as a concept 2. Talk about tools you can use to safeguard your personal information and intellectual inquiry 3. Talk about personal privacy strategies to share with students and teachers

  12. I mage: Couleur

  13. Image: Alexas_Photo

  14. https://www.youtube.com/watch?v=B8ofWFx525s https://www.youtube.com/watch?v=B8ofWFx525s

  15. Janet Vertesi sociologist of science and technology Assistant Professor in the Sociology Department at Princeton University

  16. In the chat... What are your experiences with online tracking? When did you first become aware of it?

  17. These findings suggest that the phrase that best captures Americans’ views on the choice between privacy vs. disclosure of personal information is, “It depends.” People’s views on the key tradeoff of the modern, digital economy – namely, that consumers offer information about themselves in exchange for something of value – are shaped by both the conditions of the deal and the circumstances of their lives. http://www.pewinternet.org/2016/01/14/privacy-and-information-sharing/

  18. http://www.pewresearch.org/fact-tank/2016/09/21/the-state-of-privacy-in-america

  19. Image: Matvevna

  20. HTTPS Everywhere from EFF a Firefox, Chrome, and Opera extension that encrypts your communications, making your browsing more secure

  21. Opera browser with an intergrated toggle for VPN

  22. DuckDuckGo Search engine that doesn’t track you

  23. StartPage browser provides Google search results while maintaining privacy protection

  24. TOR bounces internet users' and websites' traffic through "relays" run by thousands of volunteers around the world, making it extremely hard for anyone to identify the source of the information or the location of the user

  25. Ghostery ad-tracking and blocking plug- in

  26. TrackMeNot plug-in runs as a background process periodically issuing false search leads.

  27. Signal app for encrypted communicati on including audio and video

  28. doNOTlink.it for sharing URLs without boosting search engine results ratings

  29. ProtonMail for encrypted email

  30. Alternating browsers for high-tracking sites

  31. “Encoding content, subtweeting, and otherwise engaging in social steganography offers one strategy for reclaiming agency in an effort to achieve privacy in networked publics. In doing so, teens recognize that limiting access to meaning can be a much more powerful tool for achieving privacy than trying to limit access to the content itself.” -- boyd

  32. Image: MOMA “The focus on our limited revolution is on mitigating and defeating present- day digital surveillance.” -- Brunton & Nissenbaum

  33. In the chat... What are some strategies you use for protecting your personal information online?

  34. Recap: Questions? 1. Privacy continues to Wendy Stephens matter in ways we Jacksonville State can’t even anticipate University 2. No one is ever really anonymous on the wstephens@jsu.edu web @wsstephens 1. Tools can help you shield your personal information

  35. Please take the evaluation (link in chat) to be entered for door prizes!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend